shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆150Updated 2 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- ☆521Updated 6 months ago
- Recovers pixelized text from images☆191Updated 3 years ago
- ☆128Updated 2 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆299Updated 3 months ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆111Updated 10 months ago
- PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)☆455Updated 3 years ago
- its like a tricorder, for your wireless world.☆111Updated last year
- Hash identification program.☆153Updated 3 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆304Updated 4 years ago
- ☆231Updated 2 years ago
- Use random bot scanning the internet to seed a Conways Game of Life running on a small LCD on my desk☆40Updated 4 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆307Updated 3 years ago
- A5/1 Decryption☆114Updated 6 years ago
- ☆63Updated 2 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆601Updated last week
- Repository for the IPvSeeYou talk at Black Hat 2021☆86Updated 3 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated 8 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers…☆287Updated last year
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆343Updated last year
- Let's brute force this hotel's tv.☆81Updated 5 years ago
- BLE pentesting scripts☆71Updated 2 years ago
- The DC801 Badge Platform for DC28+☆58Updated 2 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆792Updated 2 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆31Updated 4 years ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.☆312Updated 2 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆206Updated 3 years ago
- Apple geolocation services reverse engineering. Database scraper.☆64Updated last year
- ☆368Updated last year